Please use this identifier to cite or link to this item:
http://hdl.handle.net/10061/5306

Title:

A self-confirming engine for preventing man-in-the-middle attack

Authors:

Kanamori, MasatakaKobayashi, TakashiYamaguchi, Suguru

Issue Date:

1-Mar-2004

Publisher:

Institute of Electronics, Information and Communication Engineers

Journal Title:

IEICE transactions on communications

Volume:

E87-B

Issue:

3

Start page:

530

End page:

538

Abstract:

In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping violation can occur because of vulnerability of address resolution protocols, Address Resolution Protocol (ARP) in IPv4 and Neighbor Discovery (ND) protocol in IPv6. Accordingly, a good method to prevent MITM attack by address mapping violation is essential for both current and future communications, i.e. wireless networks with roaming users and an interconnected world. Hence, our proposal mainly aims to have high usability in future applications such as embedded devices.